Features

Screen Capture & Playback

Veriato’s screen capture records everything on a monitored computer’s screen. You define how frequently you wish to capture the screen, from the default of every 30 seconds to as often as every second.

In addition to regularly defined intervals, triggers can be used to initiate screen capture or to accelerate the interval at which captures occur.

Export

Screen snapshots can be exported as individual BMP or JPG graphic files. Multiple snapshots can be exported together as an AVI video file.

Play it back, like your DVR

Reviewing activity is as easy as watching a show on a DVR. There is no more powerful, clear, and context-rich way to review activity. You may have thousands of screenshots for an individual user, but finding the one you are looking for is very easy. When viewing a recorded event you can easily navigate automatically to the screenshot that was taken closest to the time of the recorded event. Or, if you prefer, you can browse all of the screenshots in chronological order, with a navigation bar allowing you to go to any point in time quickly and easily.

Additional Media:

Screen Capture & Playback

Website Activity

Website activity – With Active/Focus/Total times recorded, you get a true understanding of not just how long a user had the website open, but how much time was spent engaged with the site. Traditional web monitors, such as proxy servers, firewalls, etc. are able to often tell how long a website was open, but aren’t able to determine how much time the user was actually on the site because they just watch the traffic itself. For example, if you opened Facebook in the morning and left it minimized all day, you’d see traffic on your firewall or proxy server all day as the feed got refreshed and so forth. However, that doesn’t mean that the user was using the site.

Additional Media:

Website Activity

Website Activity

Website Activity

Email Recording

Having a system of record that reflects all of the communications activity in the most widely used medium is critically important when conducting an investigation. Veriato Email Recording records traditional email clients (Outlook/POP/SMTP/IMAP) as well as many popular webmail services. From, To, Subject, CC, BCC, and Web Mail Host columns are sortable, and all content is searchable (Veriato 360 allows for search across all employee emails simultaneously). Keyword and phrase alerting can be combined with email recording to ensure critical information is not being moved in an unsecure manner. Attachments are captured for traditional email client activity.

See behind encryption

Because Veriato Investigator records at the employee’s computer, even email sent behind SSL encryption is visible, ensuring you see every email.

Additional Media:

Email Recording

Chat & IM

Veriato watches chat and instant messaging in nearly every web chat room or messaging client. It can capture everything said by each person joining the conversation. A single Chat/IM Event includes conversation segments by all participants.

Chat/IM Recording reveals:

A trail of communication that otherwise might be lost

How the organization is being represented to outsiders

If confidential information is being leaked

Proof of compliance or non-compliance with regulation

Inappropriate behavior, harassment

Who spends too much time in personal conversations

Additional Media:

Chat & IM

File & Document Tracking

With Document Tracking enabled, you are able to track specific USB, CD, and DVD drives. See when new files are created and when existing files are edited, renamed or deleted. You can also track print operations.

If you are not 100% sure you have the visibility you need into & Document Tracking is the answer.

File & Document Tracking is commonly used as a compliment to records needed when conducting incident response or investigations related to insider-driven leaks, breaches, or theft.

Additional Media:

File & Document Tracking

Application Activity

Veriato captures information about every application and every window opened by a user, every day.

Program Activity recording reveals:

When and how long employees are actively using productivity applications

Which productivity applications are preferred

How much time is wasted on games or frivolous applications

Who is using "malicious programs" that put network security at risk

Someone attempting to hack into secure areas using malicious tools

Someone using unapproved or illegally acquired applications

Someone gaining access to applications and files who should not

Additional Media:

Application Activity

Application Activity

Application Activity

Application Activity

Keystroke Logging

This powerful option enables the capture of every keystroke, including “hidden” characters and keystroke combinations. Enabling keystroke logging on highly privileged users ensures complete visibility into the actions of those with the greatest levels of access within your organization. When used in conjunction with Keyword alerting and Screen Capture, you can quickly zero in on potential issues and see exactly what occurred, in context. Keystrokes are associated with the application that they were typed into. For instance, it would show you that the keystrokes weren’t just typed by “user”, but they were typed into Outlook or Skype.

Passwords or not…your choice

Don't want to accidentally obtain the passwords for their employee's personal accounts? Veriato solutions can be configured to not capture passwords, enhancing employee privacy.

Additional Media:

Keystroke Logging

Keystroke Logging

Network Activity

Network activity recording allows you to see which applications are connecting to the Internet, when and where the connections are made, the IP ports they use, and the amount of network bandwidth consumed by those connections.

Network activity reveals:

Who is accessing streaming audio/video, online gaming, or other resource drains

When connections occur, at which ports, and the bandwidth consumed

Violations of Acceptable Use Policy regarding media consumption and downloads

Which applications make unnecessary or suspicious connections to the Internet

Internet transactions not be captured by Files Transferred, Program Activity, or Web Sites Visited recording

Veriato automatically watches network connections, which may be made by the user or by an application.